SOTAVerified

Intrusion Detection

Intrusion Detection is the process of dynamically monitoring events occurring in a computer system or network, analyzing them for signs of possible incidents and often interdicting the unauthorized access. This is typically accomplished by automatically collecting information from a variety of systems and network sources, and then analyzing the information for possible security problems.

Source: Machine Learning Techniques for Intrusion Detection

Papers

Showing 401425 of 800 papers

TitleStatusHype
Jasmine: A New Active Learning Approach to Combat Cybercrime0
Joint Semantic Transfer Network for IoT Intrusion Detection0
Kernel density estimation based sampling for imbalanced class distribution0
Keystroke Patterns as Prosody in Digital Writings: A Case Study with Deceptive Reviews and Essays0
KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation0
KnowGraph: Knowledge-Enabled Anomaly Detection via Logical Reasoning on Graph Data0
KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs0
Large Language Models for Cyber Security: A Systematic Literature Review0
Large Language Models in Wireless Application Design: In-Context Learning-enhanced Automatic Network Intrusion Detection0
Late Breaking Results: Scalable and Efficient Hyperdimensional Computing for Network Intrusion Detection0
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT0
LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks0
Learning automata based SVM for intrusion detection0
Learning-Based Detection of Malicious Volt-VAr Control Parameters in Smart Inverters0
Learning detectors of malicious web requests for intrusion detection in network traffic0
Learning in Multiple Spaces: Few-Shot Network Attack Detection with Metric-Fused Prototypical Networks0
Learning Privately from Multiparty Data0
Learning to Detect: A Data-driven Approach for Network Intrusion Detection0
Learning With Differential Privacy0
LEMDA: A Novel Feature Engineering Method for Intrusion Detection in IoT Systems0
LENS-XAI: Redefining Lightweight and Explainable Network Security through Knowledge Distillation and Variational Autoencoders for Scalable Intrusion Detection in Cybersecurity0
Leveraging Planning Landmarks for Hybrid Online Goal Recognition0
Leveraging Siamese Networks for One-Shot Intrusion Detection Model0
LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in Beyond 5G0
LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems0
Show:102550
← PrevPage 17 of 32Next →

Benchmark Results

#ModelMetricClaimedVerifiedStatus
1Random ForestAccuracy (%)98.13Unverified
2K-Nearest NeighborsAccuracy (%)98.07Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-PCAAUC0.94Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-IBAUC0.95Unverified
#ModelMetricClaimedVerifiedStatus
1MSTREAM-AEAUC0.9Unverified